Skip to main content

Transaction-Based Charging in Mnemosyne: A Peer-to-Peer Steganographic Storage System

  • Conference paper
  • First Online:
Web Engineering and Peer-to-Peer Computing (NETWORKING 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2376))

Included in the following conference series:

Abstract

Mnemosyne is a peer-to-peer steganographic storage system: one in which the existence of a user’s files cannot be verified without a key. This paper applies the techniques used in Mnemosyne — erasure codes and anonymous block writing — to move most of the administrative overhead of a commercial storage service over to the client, resulting in cost savings for the service provider.

The contribution of this paper is to present a radically alternative way of charging for storage services. In place of renting some amount of space for some period of time, systems like Mnemosyne allow more flexible billing models closer to those proposed for network bandwidth, including versions of congestion pricing. We show how a reliable, commercial storage service using is feasible, and examine the details of the tradeoff it offers compared with conventional storage services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Steven Hand and Timothy Roscoe. Mnemosyne: Peer-to-Peer Steganographic Storage. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.

    Google Scholar 

  2. Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Workshop on Design Issues in Anonymity and Unobservability, pages 46–66, July 2000.

    Google Scholar 

  3. Roger Dingledine, Michael J. Freedman, and David Molnar. The Free Haven Project: Distributed Anonymous Storage Service. In Workshop on Design Issues in Anonymity and Unobservability, pages 67–95, July 2000.

    Google Scholar 

  4. Marc Waldman, Aviel D. Rubin, and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proceeding of the 9th USENIX Security Symposium, pages 59–72, August 2000.

    Google Scholar 

  5. F.S. Annexstein, K.A. Berman, and M. Jovanovic. Latency Effects on Reachability in Large-scale Peer-to-Peer Networks. In Proceedings Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA), 2001.

    Google Scholar 

  6. Ben Y. Zhao, John D. Kubiatowicz, and Anthony D. Joseph. Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing. Technical Report UCB//CSD-01-1141, U. C. Berkeley, April 2000.

    Google Scholar 

  7. S Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A Scalable Content-Addressable Network. In Proceedings of ACM SIGCOMM 2001, San Diego, California, USA., August 2001.

    Google Scholar 

  8. I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of ACM SIGCOMM 2001, San Diego, California, USA., August 2001.

    Google Scholar 

  9. Antony Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In Proceedings of the 18th IFIP/ACM Internation Conference on Distributed Systems Platforms (Middleware 2001), Heidelberg, Germany, November 2001.

    Google Scholar 

  10. John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, and Ben Zhao. OceanStore: An Architecture for Global-Scale Persistent Storage. In Proceedings of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), November 2000.

    Google Scholar 

  11. S. Zhuang, B. Zhao, A. Joseph, R. Katz, and J. Kubiatowicz. Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination. In Proceedings of the Eleventh International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 2001), June 2001.

    Google Scholar 

  12. F. Dabek, M. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada., October 2001.

    Google Scholar 

  13. Anthony Rowstron and Peter Druschel. Storage management and caching in PAST, a large scale persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada., October 2001.

    Google Scholar 

  14. Antony Rowstron, Anne-Marie Kermarrec, Miguel Castro, and Peter Druschel. SCRIBE: The design of a large-scale event notification infrastructure. In Proceedings of the Third International Workshop on Networked Group Communications (NGC2001), London, UK, November 2001.

    Google Scholar 

  15. Ross Anderson, Roger Needham, and Adi Shamir. The Steganographic File System. In IWIH: International Workshop on Information Hiding, 1998.

    Google Scholar 

  16. Matei Ripeanu and Ian Foster. Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.

    Google Scholar 

  17. Bryce Wilcox-O’Hearn. Experiences Deploying a Large-Scale Emergent Network. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.

    Google Scholar 

  18. Qin Lv, Sylvia Ratnasamy, and Scott Shenker. Can Heterogeneity Make Gnutella Scalable? In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.

    Google Scholar 

  19. John R. Douceur. The Sybil Attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Boston, MA, March 2002.

    Google Scholar 

  20. D. Chaum, A. Fiat, and M. Naor. Untraceable Electronic Cash. In Advances in Cryptology-CRYPTO’ 88 Proceedings, pages 319–327, 1989.

    Google Scholar 

  21. M. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Communications of the ACM, 36(2):335–348, April 1989.

    Google Scholar 

  22. Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz. OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. In Eighth ACM Conference on Computer and Communications Security (CCS-8). ACM Press, August 2001.

    Google Scholar 

  23. Peter Key. Service differentiation: Congestion pricing, brokers and bandwidth futures. In Proceedings of the Ninth International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 1999), June 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Roscoe, T., Hand, S. (2002). Transaction-Based Charging in Mnemosyne: A Peer-to-Peer Steganographic Storage System. In: Gregori, E., Cherkasova, L., Cugola, G., Panzieri, F., Picco, G.P. (eds) Web Engineering and Peer-to-Peer Computing. NETWORKING 2002. Lecture Notes in Computer Science, vol 2376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45745-3_31

Download citation

  • DOI: https://doi.org/10.1007/3-540-45745-3_31

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44177-9

  • Online ISBN: 978-3-540-45745-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics